Cisco CCNP Cybersecurity - Performing Cybersecurity Using Cisco Security Technologies (CBRCOR)
Start Date - End Date April 27 - May 01, 2026
Address 3301 N San Fernando Blvd
City BurbankState CA
Download the complete PDF for this course to see the detailed course outline.
Course Overview
thinQtank® Learning Learning is offering a unique five-day training camp comprised of five days of instructor-led learning that gives students the knowledge and skills needed to implement cybersecurity using Cisco technologies. The Performing Cybersecurity Using Cisco Security Technologies (CBRCOR) course guides you through the fundamentals, methods, and automation of cybersecurity operations. The knowledge you gain in this training will prepare you for the role of Information Security Analyst on a Security Operations Center (SOC) team. You will learn foundational concepts and their application in real-world scenarios, as well as how to leverage playbooks to formulate an Incident Response (IR). The training teaches you how to use automation for security using cloud platforms and a SecDevOps methodology. You will learn the techniques for detecting cyberattacks, analyzing threats, and making appropriate recommendations to improve cybersecurity.
Our Learning Exclusive
In our classroom, students receive gigabytes of take-home CBT and lab material with over four-hundred labs to keep practicing and refining the skills learned in the classroom. Additionally, our students receive:
■ thinQtank® Learning Accelerated Custom Exam Study Guide for the CBRCOR exam
■ Exam delivery in classroom with 98% success
■ Custom and focused exam preparation software and materials
■ Course specific thinQtank® Learning publications to promote a fun and exciting learning
■ Membership to the thinQtank® Learning University Online
■ WE DO NOT "TEACH THE TEST" - Students will receive valuable examples and discussion
■ Receive all reading material and study guides when you register
■ All courses taught by CCIE Certified instructors
Course Objectives
Upon completing this portion of the course, learners will be able to meet these objectives:
■ Describe the types of service coverage within a SOC and operational responsibilities associated with each
■ Compare security operations considerations of cloud platforms
■ Describe the general methodologies of SOC platforms development, management, and automation
■ Describe asset segmentation, segregation, network segmentation, microsegmentation, and approaches to each, as part of asset controls and protections
■ Describe Zero Trust and associated approaches, as part of asset controls and protections
■ Perform incident investigations, Security Information and Event Management (SIEM), security orchestration and automation (SOAR)
■ Use different types of core security technology platforms for security monitoring, investigation, and response
■ Describe the DevOps and SecDevOps processes
■ Describe the common data formats (e.g., JavaScript Object Notation (JSON), HTML, XML, and Comma-Separated Values (CSV))
■ Describe API authentication mechanisms
■ Analyze the approach and strategies of threat detection during monitoring, investigation, and response
■ Determine known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs)
■ Interpret events during an attack based on analysis of traffic patterns
■ Describe different security tools and limitations for network analysis (e.g., packet capture, traffic analysis, and network log analysis tools)
■ Analyze anomalous user and entity behavior (UEBA)
■ Perform proactive threat hunting following best practices
Exclusive Package Ensuring Success
■ Additional hours of remote lab access
■ Custom video recordings with even more in-depth learning of course topics
■ Customized practice exam software
■ Digital courseware
■ Retake any or all portions of the course as many times as you like in person or live on-line for 24 months
■ Six months mentoring access to CCIE engineers after completing the course
■ Post-class ongoing "Office Hours" events: Interactive events grant you access to top instructors long after your class is completed to ensure that you successfully utilize what you've learned.
■ Cisco-related Acronym List to help you understand key terms
■ Tips & Tricks: From preparing for your course through post-class review, these tips will help you to apply your new knowledge
Course Duration
■ Five days of instructor-led learning
■ 70% Lecture and 30% Hands-On Labs
Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
■ Familiarity with the Splunk search and navigation functions
■ Basic understanding of scripting using one or more of Python, JavaScript, PHP or similar
■ Familiarity with UNIX/Linux shells (bash, csh) and shell commands
Target Audience
■ Those looking to earn their CCNP Certification
■ Those looking to earn their CCNP Specialist
■ Cybersecurity Engineers/Investigators
■ Incident Managers/Responders
■ Network Engineers and SOC Analysts currently functioning at entry level with a minimum of 1 year of experience
Exam Information
■ 350-201 - Performing CyberOps Using Cisco Security Technologies (CBRCOR)
Delivery Methods
■ Instructor-Led Training
■ Immersive Live-Online Training
■ On-Site and Custom Delivery
